32101 | -- | 0 | Ya Liu 0001, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng. Improved impossible differential cryptanalysis of large-block Rijndael |
32102 | -- | 0 | Rui Zong, Xiaoyang Dong, Xiaoyun Wang. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256 |
32103 | -- | 0 | Zhitao Guan, Yue Zhang, Liehuang Zhu, Longfei Wu, Shui Yu. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid |
32104 | -- | 0 | Jingting Xue, Chunxiang Xu, Jining Zhao, Jianfeng Ma. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain |
32105 | -- | 0 | Wei Wei, Jiazhe Chen, Dan Li, Beibei Wang. Partially known information attack on SM2 key exchange protocol |
32106 | -- | 0 | Yi Guo, Fu Miao, Liancheng Zhang, Yu Wang. CATH: an effective method for detecting denial-of-service attacks in software defined networks |
32107 | -- | 0 | MeiHui Chen, Hua Chen, Limin Fan, Shaofeng Zhu, Wei Xi, Dengguo Feng. A new discrete Fourier transform randomness test |
32108 | -- | 0 | Hailun Yan, Yiyuan Luo, Mo Chen, Xuejia Lai. New observation on the key schedule of RECTANGLE |
32109 | -- | 0 | Yanbing Wu, Haining Fan, Xiaoyun Wang, Guangnan Zou. A regulated digital currency |
32110 | -- | 0 | Zhenbin Yan 0001, Yi Deng. A novel approach to public-coin concurrent zero-knowledge and applications on resettable security |
32111 | -- | 0 | Shiyao Chen, Ru Liu, Tingting Cui, Meiqin Wang. Automatic search method for multiple differentials and its application on MANTIS |
32112 | -- | 0 | Kamel Ammour, Lei Wang, Dawu Gu. Pseudo random oracle of Merkle-Damgård hash functions revisited |
32113 | -- | 0 | Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang 0016. Universally composable secure geographic area verification without pre-shared secret |
39101 | -- | 0 | Xueqing Wang, Biao Wang, Bei Liang, Rui Xue 0001. A more compact multi-id identity-based FHE scheme in the standard model and its applications |
39102 | -- | 0 | Chensi Wu, Tao Wen, Yuqing Zhang. A revised CVSS-based system to improve the dispersion of vulnerability risk scores |
39103 | -- | 0 | Yusong Du, Baodian Wei, Huang Zhang. A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers |
39104 | -- | 0 | Bo Yang 0025, Xiaofeng Liao. Some characteristics of logistic map over the finite field |
39105 | -- | 0 | Sen Xu, Weija Wang, Xiangjun Lu, Zheng Guo 0001, Junrong Liu, Dawu Gu. q)-application to secure RSA-CRT |
39106 | -- | 0 | Chunliu Yan, Ziyi Ni, Bin Cao 0003, Rongxing Lu, Shaohua Wu, Qinyu Zhang. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks |
39107 | -- | 0 | Jia Zhang, Hai-Xin Duan, Jian Jiang, Jinjin Liang, Jianping Wu. Finding the best answer: measuring the optimization of public and authoritative DNS |
39108 | -- | 0 | Ruishan Xin, Yidong Yuan, Jiaji He, Yuehui Li, Yiqiang Zhao. High-efficient generation algorithm for large random active shield |
39109 | -- | 0 | Tairong Shi, Jie Guan. Real-time state recovery attack against MORUS in nonce-misuse setting |
39110 | -- | 0 | Jianghua Zhong, Dongdai Lin. Decomposition of nonlinear feedback shift registers based on Boolean networks |
39111 | -- | 0 | Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li, Nanyuan Cao. Secure key-aggregation authorized searchable encryption |